4 Commits

Author SHA1 Message Date
1bfad8c651 * Thu Jan 02 2025 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-12.sme
- fix OCSP Stapling support [SME: 12819]
- fix .well-known/security.txt [SME: 12818]
- add X-Permitted-Cross-Domain-Policies header [SME: 12857]
- add  Cross-Origin headers [SME: 12856]
- add Permissions-Policy header [SME: 12855]
2025-01-02 00:13:14 -05:00
aecee0e087 * Fri Dec 27 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-11.sme
- add X-Content-Type-Options nosniff [SME: 12835]
- add Strict Transport Security support HSTS [SME: 12815]
- add X-Frame-Options SAMEORIGIN Header to prevent clickjacking [SME: 12816]
- add referrer-Policy same-origin [SME: 12817]
- add OCSP Stapling support [SME: 12819]
- add CSP Content-Security-Policy support [SME: 9567]
- add .well-known and .well-known/security.txt [SME: 12818]
2024-12-31 11:09:42 -05:00
d7ed3bd49d * Fri Dec 27 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-10.sme
- add X-Content-Type-Options nosniff [SME: 12835]
- add Strict Transport Security support HSTS [SME: 12815]
- add X-Frame-Options SAMEORIGIN Header to prevent clickjacking [SME: 12816]
- add referrer-Policy same-origin [SME: 12817]
- add OCSP Stapling support [SME: 12819]
- add CSP Content-Security-Policy support [SME: 9567]
- add .well-known and .well-known/security.txt [SME: 12818]
2024-12-31 03:55:45 -05:00
ab245eca09 * Fri Dec 27 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-9.sme
- add X-Content-Type-Options nosniff [SME: 12835]
- add Strict Transport Security support HSTS [SME: 12815]
- add X-Frame-Options SAMEORIGIN Header to prevent clickjacking [SME: 12816]
- add referrer-Policy same-origin [SME: 12817]
- add OCSP Stapling support [SME: 12819]
- add CSP Content-Security-Policy support [SME: 9567]
- add .well-known and .well-known/security.txt [SME: 12818]
2024-12-31 03:43:52 -05:00
13 changed files with 28 additions and 14 deletions

View File

@@ -6,7 +6,7 @@ use esmith::Build::CreateLinks qw(:all);
#--------------------------------------------------
my $event = "smeserver-apache-update";
templates2events("/etc/httpd/conf/httpd.conf", $event);
templates2events("/var/www/html/.well-known/acme-challenge/security.txt", $event);
templates2events("/var/www/html/.well-known/security.txt", $event);
safe_symlink("restart", "root/etc/e-smith/events/$event/services2adjust/httpd-e-smith");
event_link("systemd-reload", $event, "89");
event_link("systemd-default", $event, "88");
@@ -17,7 +17,7 @@ templates2events("/etc/logrotate.d/httpd", $event);
#--------------------------------------------------
my $event = "console-save";
templates2events("/var/www/html/.well-known/acme-challenge/security.txt", $event);
templates2events("/var/www/html/.well-known/security.txt", $event);
templates2events("/etc/httpd/conf/httpd.conf", $event);
safe_symlink("restart", "root/etc/e-smith/events/$event/services2adjust/httpd-e-smith");
@@ -145,7 +145,7 @@ safe_symlink("reload", "root/etc/e-smith/events/$event/services2adjust/httpd-e-s
$event = "remoteaccess-update";
templates2events("/var/www/html/.well-known/acme-challenge/security.txt", $event);
templates2events("/var/www/html/.well-known/security.txt", $event);
templates2events("/etc/httpd/conf/httpd.conf", $event);
safe_symlink("reload", "root/etc/e-smith/events/$event/services2adjust/httpd-e-smith");
@@ -155,7 +155,7 @@ safe_symlink("reload", "root/etc/e-smith/events/$event/services2adjust/httpd-e-s
$event = "email-update";
templates2events("/var/www/html/.well-known/acme-challenge/security.txt", $event);
templates2events("/var/www/html/.well-known/security.txt", $event);
templates2events("/etc/httpd/conf/httpd.conf", $event);
safe_symlink("reload", "root/etc/e-smith/events/$event/services2adjust/httpd-e-smith");
@@ -165,7 +165,7 @@ safe_symlink("reload", "root/etc/e-smith/events/$event/services2adjust/httpd-e-s
$event = "logrotate";
templates2events("/var/www/html/.well-known/acme-challenge/security.txt", $event);
templates2events("/var/www/html/.well-known/security.txt", $event);
safe_symlink("reload", "root/etc/e-smith/events/$event/services2adjust/httpd-e-smith");
#--------------------------------------------------
@@ -173,7 +173,7 @@ safe_symlink("reload", "root/etc/e-smith/events/$event/services2adjust/httpd-e-s
#--------------------------------------------------
$event = "ssl-update";
templates2events("/var/www/html/.well-known/acme-challenge/security.txt", $event);
templates2events("/var/www/html/.well-known/security.txt", $event);
templates2events("/etc/httpd/conf/httpd.conf", $event);
safe_symlink("reload", "root/etc/e-smith/events/$event/services2adjust/httpd-e-smith");
@@ -182,7 +182,7 @@ safe_symlink("reload", "root/etc/e-smith/events/$event/services2adjust/httpd-e-s
#--------------------------------------------------
$event = "post-install";
templates2events("/var/www/html/.well-known/acme-challenge/security.txt", $event);
templates2events("/var/www/html/.well-known/security.txt", $event);
templates2events("/etc/logrotate.d/httpd", $event);
#--------------------------------------------------
@@ -190,6 +190,6 @@ templates2events("/etc/logrotate.d/httpd", $event);
#--------------------------------------------------
$event = "post-upgrade";
templates2events("/var/www/html/.well-known/acme-challenge/security.txt", $event);
templates2events("/var/www/html/.well-known/security.txt", $event);
templates2events("/etc/logrotate.d/httpd", $event);

View File

@@ -1,2 +1,2 @@
SSLUseStapling On
SSLStaplingCache dbm:/run/httpd/ssl_stapling(32768)
SSLStaplingCache dbm:/run/httpd/ssl_stapling

View File

@@ -0,0 +1 @@
header setifempty X-Permitted-Cross-Domain-Policies "none"

View File

@@ -0,0 +1,5 @@
Header setifempty Cross-Origin-Embedder-Policy "unsafe-none; report-to='default'"
Header setifempty Cross-Origin-Embedder-Policy-Report-Only "unsafe-none; report-to='default'"
Header setifempty Cross-Origin-Opener-Policy "unsafe-none"
Header setifempty Cross-Origin-Opener-Policy-Report-Only "unsafe-none; report-to='default'"
Header setifempty Cross-Origin-Resource-Policy "same-site"

View File

@@ -0,0 +1 @@
Header setifempty Permissions-Policy "accelerometer=(), autoplay=(), camera=(), cross-origin-isolated=(), display-capture=(self), encrypted-media=(), fullscreen=*, geolocation=(self), gyroscope=(), keyboard-map=(), magnetometer=(), microphone=(), midi=(), payment=*, picture-in-picture=*, publickey-credentials-get=(), screen-wake-lock=(), sync-xhr=*, usb=(), xr-spatial-tracking=(), gamepad=(), serial=()"

View File

@@ -5,5 +5,5 @@ Contact: {
# Contact: mailto:security%2Buri%2Bencoded@example.com
# Contact: tel:+1-201-555-0123
# Contact: https://example.com/security-contact.html
${'httpd-e-smith'}{'SecurityContact'}||"mailto:admin@$DomainName"}
${'httpd-e-smith'}{'SecurityContact'}||"mailto:admin\@$DomainName"}

View File

@@ -4,5 +4,5 @@ Encryption: {
# Encryption: https://example.com/pgp-key.txt
# Encryption: dns:5d2d37ab76d47d36._openpgpkey.example.com?type=OPENPGPKEY
# Encryption: openpgp4fpr:5f2de5521c63a801ab59ccb603d49de44b29100f
${'httpd-e-smith'}{'SecurityEncryption'}||'none'}
${'httpd-e-smith'}{'SecurityEncryption'}||'openpgp4fpr:'}

View File

@@ -8,7 +8,7 @@ Documentation=man:apachectl(8)
Type=notify
ExecStartPre=/sbin/e-smith/service-status httpd-e-smith
ExecStartPre=/sbin/e-smith/expand-template /etc/httpd/conf/httpd.conf
ExecStartPre=-/sbin/e-smith/expand-template /var/www/html/.well-known/acme-challenge/security.txt
ExecStartPre=-/sbin/e-smith/expand-template /var/www/html/.well-known/security.txt
ExecStartPre=/sbin/e-smith/systemd/httpd-e-smith-prepare
ExecStart=/usr/sbin/httpd -f /etc/httpd/conf/httpd.conf -DFOREGROUND
ExecReload=/usr/sbin/httpd -f /etc/httpd/conf/httpd.conf -k graceful

View File

@@ -4,7 +4,7 @@ Summary: smeserver server and gateway - apache module
%define name smeserver-apache
Name: %{name}
%define version 11.0.0
%define release 8
%define release 12
Version: %{version}
Release: %{release}%{?dist}
License: GPL
@@ -74,7 +74,14 @@ if [ $1 -gt 1 ] ; then
fi
%changelog
* Fri Dec 27 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-8.sme
* Thu Jan 02 2025 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-12.sme
- fix OCSP Stapling support [SME: 12819]
- fix .well-known/security.txt [SME: 12818]
- add X-Permitted-Cross-Domain-Policies header [SME: 12857]
- add Cross-Origin headers [SME: 12856]
- add Permissions-Policy header [SME: 12855]
* Fri Dec 27 2024 Jean-Philippe Pialasse <jpp@koozali.org> 11.0.0-11.sme
- add X-Content-Type-Options nosniff [SME: 12835]
- add Strict Transport Security support HSTS [SME: 12815]
- add X-Frame-Options SAMEORIGIN Header to prevent clickjacking [SME: 12816]